spot-people-engaging-with-competitors
Audited by Socket on Apr 17, 2026
3 alerts found:
Anomalyx3No clear malware behavior is evident in this fragment (single fixed HTTPS destination, no persistence/backdoor/exfil beyond intended API authentication). The primary security risk is the use of `source` on a discovered `.env` file discovered via directory traversal, which can enable arbitrary command execution if the `.env` contents/location are attacker-controlled. METHOD/ENDPOINT are unvalidated and could cause unintended requests, but they do not appear to enable arbitrary host targeting in this snippet.
This module appears to be a legitimate sign-up/verification helper that communicates only with a fixed OpenFunnel API domain and stores returned credentials locally as intended by the script’s comments. However, it carries moderate security/abuse risk due to sensitive API key persistence to a local .env file, fragile parsing of JSON responses using grep/cut, and unescaped JSON construction from user-controlled inputs (risk of malformed/manipulated payloads). No strong indicators of overt malware or supply-chain sabotage are present in this fragment, but the credential-handling and parsing approach should be reviewed and hardened (e.g., JSON escaping and a proper JSON parser) before use in security-sensitive environments.
SUSPICIOUS: The skill’s purpose, requested inputs, and API data flow are broadly consistent with OpenFunnel lead-signal monitoring, and there is no clear credential-harvesting or third-party proxy behavior. Risk remains medium because the core behavior is hidden inside local shell wrappers that write credentials to .env and are not reviewable from the skill text, so execution trust cannot be fully verified.